Sign in
SPC
2003
2004
2005
2006
2003
2006
Keyphrases
Publications
2006
Gabriel Maciá-Fernández
,
Jesús Esteban Díaz Verdejo
,
Pedro Garcia-Teodoro
Low Rate DoS Attack to Monoprocess Servers.
SPC
(2006)
Slim Trabelsi
,
Jean-Christophe R. Pazzaglia
,
Yves Roudier
Enabling Secure Discovery in a Pervasive Environment.
SPC
(2006)
Howard Chivers
Trust Without Identification.
SPC
(2006)
Leping Huang
,
Hiroshi Yamane
,
Kanta Matsuura
,
Kaoru Sezaki
Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation.
SPC
(2006)
Hongxia Jin
Higher Dependability and Security for Mobile Applications.
SPC
(2006)
Michael Friedewald
,
Elena Vildjiounaite
,
Yves Punie
,
David Wright
The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues.
SPC
(2006)
Dieter Hutter
,
Melanie Volkamer
Information Flow Control to Secure Dynamic Web Service Composition.
SPC
(2006)
Michael J. Covington
,
Manoj R. Sastry
,
Deepak J. Manohar
Attribute-Based Authentication Model for Dynamic Mobile Environments.
SPC
(2006)
Alexander Becher
,
Zinaida Benenson
,
Maximillian Dornseif
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.
SPC
(2006)
Rafael Accorsi
,
Adolf Hohl
Delegating Secure Logging in Pervasive Computing Systems.
SPC
(2006)
Siraj A. Shaikh
,
Christos K. Dimitriadis
Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.
SPC
(2006)
Sjouke Mauw
,
Ivo van Vessem
,
Bert Bos
Forward Secure Communication in Wireless Sensor Networks.
SPC
(2006)
Gerald Eichler
,
Matthias O. Will
Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal Security.
SPC
(2006)
Jodie P. Boyer
,
Kaijun Tan
,
Carl A. Gunter
Privacy Sensitive Location Information Systems in Smart Buildings.
SPC
(2006)
Jin Wook Byun
,
Su-Mi Lee
,
Dong Hoon Lee
,
Dowon Hong
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks.
SPC
(2006)
Bo-Yin Yang
,
Chen-Mou Cheng
,
Bor-rong Chen
,
Jiun-Ming Chen
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems.
SPC
(2006)
Urs Hengartner
,
Peter Steenkiste
Securing Information Gateways with Derivation-Constrained Access Control.
SPC
(2006)
volume 3934, 2006
Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings
SPC
3934 (2006)
2005
Florina Almenárez
,
Andrés Marín López
,
Celeste Campo
,
R. Carlos García
TrustAC: Trust-Based Access Control for Pervasive Devices.
SPC
(2005)
Jaap-Henk Hoepman
Ephemeral Pairing on Anonymous Networks.
SPC
(2005)
Yang Liu
,
John A. Clark
,
Susan Stepney
"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.
SPC
(2005)
Marco Gruteser
,
Baik Hoh
On the Anonymity of Periodic Location Samples.
SPC
(2005)
Claudia Eckert
Security Issues of Mobile Devices.
SPC
(2005)
Keunwoo Rhee
,
Jin Kwak
,
Seungjoo Kim
,
Dongho Won
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
SPC
(2005)
Tobias Kölsch
,
Lothar Fritsch
,
Markulf Kohlweiss
,
Dogan Kesdogan
Privacy for Profitable Location Based Services.
SPC
(2005)
Masayuki Hanadate
,
Masayuki Terada
,
Shinji Nagao
,
Toshiyuki Miyazawa
,
Yukiko Yosuke
,
Seiji Tomita
,
Ko Fujimura
P2P Digital Value Fair Trading System Using Smart Cards.
SPC
(2005)
Dennis Kügler
Security Concept of the EU-Passport.
SPC
(2005)
Panagiotis Papadimitratos
Securing Ad Hoc Networks.
SPC
(2005)
Christian Floerkemeier
,
Frédéric Thiesse
EPC Technology.
SPC
(2005)
Michael Hitchens
,
Judy Kay
,
Bob Kummerfeld
,
Ajay Brar
Secure Identity Management for Pseudo-Anonymous Service Access.
SPC
(2005)
Sadie Creese
,
Michael Goldsmith
,
Richard Harrison
,
Bill Roscoe
,
Paul Whittaker
,
Irfan Zakiuddin
Exploiting Empirical Engagement in Authentication Protocol Design.
SPC
(2005)
Lorenz M. Hilty
Pervasive Computing - A Case for the Precautionary Principle?
SPC
(2005)
Michael Friedewald
Safeguards in a World of Ambient Intelligence.
SPC
(2005)
Ádám Darvas
,
Reiner Hähnle
,
David Sands
A Theorem Proving Approach to Analysis of Secure Information Flow.
SPC
(2005)
Stefaan Seys
,
Bart Preneel
Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.
SPC
(2005)
Adam J. Lee
,
Jodie P. Boyer
,
Chris Drexelius
,
Prasad Naldurg
,
Raquel L. Hill
,
Roy H. Campbell
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.
SPC
(2005)
Bertin Klein
,
Tristan Miller
,
Sandra Zilles
Security Issues for Pervasive Personalized Communication Systems.
SPC
(2005)
Adolf Hohl
,
Lutz Lowis
,
Alf Zugenmaier
Look Who's Talking - Authenticating Service Access Points.
SPC
(2005)
Sye Loong Keoh
,
Emil Lupu
An Efficient Access Control Model for Mobile Ad-Hoc Communities.
SPC
(2005)
Masayuki Terada
,
Kensaku Mori
,
Kazuhiko Ishii
,
Sadayuki Hongo
,
Tomonori Usaka
,
Noboru Koshizuka
,
Ken Sakamura
TENeT: A Framework for Distributed Smartcards.
SPC
(2005)
volume 3450, 2005
Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
SPC
3450 (2005)
volume 2802, 2004
Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers
SPC
2802 (2004)
2003
Marco Gruteser
,
Dirk Grunwald
A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks.
SPC
(2003)
Friedemann Mattern
The Age of Pervasive Computing? Everything Smart, Everything Connected?
SPC
(2003)
Ruby B. Lee
,
David K. Karig
,
John Patrick McGregor
,
Zhijie Shi
Enlisting Hardware Architecture to Thwart Malicious Code Injection.
SPC
(2003)
Kemal Bicakci
,
Nazife Baykal
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing.
SPC
(2003)
Sadie Creese
,
Michael Goldsmith
,
Bill Roscoe
,
Irfan Zakiuddin
Authentication for Pervasive Computing.
SPC
(2003)
Jean-Marc Seigneur
,
Stephen Farrell
,
Christian Damsgaard Jensen
,
Elizabeth Gray
,
Yong Chen
End-to-End Trust Starts with Recognition.
SPC
(2003)
Engelbert Hubbers
,
Martijn Oostdijk
,
Erik Poll
Implementing a Formally Verifiable Security Protocol in Java Card.
SPC
(2003)
Håkan Kvarnström
,
Hans Hedbom
,
Erland Jonsson
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions.
SPC
(2003)